Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCSK Exam Dumps - Certificate of Cloud Security Knowledge v5 (CCSKv5.0)

Go to page:
Question # 41

How can Identity and Access Management (IAM) policies on keys ensure adherence to the principle of least privilege?

A.

By rotating keys on a regular basis

B.

By using default policies for all keys

C.

By specifying fine-grained permissions

D.

By granting root access to administrators

Full Access
Question # 42

In the context of FaaS, what is primarily defined in addition to functions?

A.

Data storage

B.

Network configurations

C.

User permissions

D.

Trigger events

Full Access
Question # 43

Who is responsible for the security of the physical infrastructure and virtualization platform?

A.

The cloud consumer

B.

The majority is covered by the consumer

C.

It depends on the agreement

D.

The responsibility is split equally

E.

The cloud provider

Full Access
Question # 44

Which of the following best describes a key aspect of cloud risk management?

A.

A structured approach for performance optimization of cloud services

B.

A structured approach to identifying, assessing, and addressing risks

C.

A structured approach to establishing the different what/if scenarios for cloud vs on-premise decisions

D.

A structured approach to SWOT analysis

Full Access
Question # 45

What is the primary function of Data Encryption Keys (DEK) in cloud security?

A.

To increase the speed of cloud services

B.

To encrypt application data

C.

To directly manage user access control

D.

To serve as the primary key for all cloud resources

Full Access
Question # 46

How is encryption managed on multi-tenant storage?

A.

Single key for all data owners

B.

One key per data owner

C.

Multiple keys per data owner

D.

The answer could be A, B, or C depending on the provider

E.

C for data subject to the EU Data Protection Directive; B for all others

Full Access
Question # 47

What is a primary benefit of implementing micro-segmentation within a Zero Trust Architecture?

A.

Simplifies network design and maintenance

B.

Enhances security by isolating workloads from each other

C.

Increases the overall performance of network traffic

D.

Reduces the need for encryption across the network

Full Access
Question # 48

CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.

A.

Risk Impact

B.

Domain

C.

Control Specification

Full Access
Go to page: